A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.
☆14Jan 15, 2025Updated last year
Alternatives and similar repositories for AtlasReaper
Users that are interested in AtlasReaper are comparing it to the libraries listed below
Sorting:
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- ☆14Mar 30, 2022Updated 3 years ago
- ☆26Nov 25, 2025Updated 3 months ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- ☆75Feb 4, 2024Updated 2 years ago
- ☆65Mar 15, 2024Updated 2 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆31Jun 22, 2025Updated 8 months ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- ☆50May 12, 2021Updated 4 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- C# port of chm lib☆24Sep 7, 2011Updated 14 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- ☆153Oct 2, 2023Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- A BOF for lazy people☆23Apr 4, 2024Updated last year
- ☆126Sep 1, 2024Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago